Assignment 1: Response Teams
IT plays an integral role in responding to incidents or breaches in security in any organization. Some rely too heavily on IT, not realizing that the key players in companies are often those who are directly customer-facing and have communications with customers, while others do not involve IT enough, and IT is unaware of what mission-critical systems are. Finding that balance is vital.
Submission Details:
A minimum of 250 words, post to the Discussion Area your response to the following:
Identify a case study in which a response team was organized to handle a security breach within information systems. The case you select must include the postmortem about the response and the outcome. (You can find many of these in a Google search.)
Evaluate the company's security breach and the situation that the team responded to. Analyze postmortem material and assess if you would draw the same conclusion as the response team about what happened.
Was the response team activated in a timely manner? Would you modify the response plan to have a different response in the future? Do you agree with the postmortem?
In your write-up, be sure to identify the reason for each of your positions and opinions. You must cite scholarly research or white papers issued by organizations that are adept at incidence response.
Your response should rely upon at least two sources from professional literature-articles from peer-reviewed journals and relevant textbooks. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., APA format); and use accurate spelling, grammar, and punctuation.